مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

709
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

Design of a FPGA-based Processor for the Cryptographic Algorithms SHA-2

Pages

  35-44

Abstract

secure hash algorithms (SHA) are essential parts of cryptographic algorithms that with advent of applications such as using PDAs in our society, their importance has increased dramatically in order to preserve confidentiality. Besides that, with technology development, the necessity of implementation of such algorithms on flexible platforms can be challenging. Therefore, using fewer resources and increasing the speed of operations are the main challenges in designing and implementing such algorithms. In this paper, a new architecture is proposed for FPGA-based processor for cryptographic algorithms SHA-2. In proposed processor, using memory units and multiport datapath and followed by parallel performance of processor reduces use of resources and increases data process speed. processor architecture is modeled by VHDL language for SHA-2 and its implementation has been done on FPGA platforms for Virtex series by ISE software. The results of implementation indicate that the proposed processor compared with earlier works with similar objectives, was able to preserve desired level of throughput and efficiency by increasing 25% frequency for SHA-256 and occupying 55% less area for SHA-512. Proposed processor is appropriate for applications such as Trusted Mobile Platforms (TMP), Digital Currencies (Bitcoin) and secure routing of Networkon Chip (NoC).

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    Sedgh Ahrabi, Neda, & Jabraeil Jamali, MohammadAli. (2019). Design of a FPGA-based Processor for the Cryptographic Algorithms SHA-2. IRANIAN COMMUNICATION AND INFORMATION TECHNOLOGY, 10(37-38 ), 35-44. SID. https://sid.ir/paper/406552/en

    Vancouver: Copy

    Sedgh Ahrabi Neda, Jabraeil Jamali MohammadAli. Design of a FPGA-based Processor for the Cryptographic Algorithms SHA-2. IRANIAN COMMUNICATION AND INFORMATION TECHNOLOGY[Internet]. 2019;10(37-38 ):35-44. Available from: https://sid.ir/paper/406552/en

    IEEE: Copy

    Neda Sedgh Ahrabi, and MohammadAli Jabraeil Jamali, “Design of a FPGA-based Processor for the Cryptographic Algorithms SHA-2,” IRANIAN COMMUNICATION AND INFORMATION TECHNOLOGY, vol. 10, no. 37-38 , pp. 35–44, 2019, [Online]. Available: https://sid.ir/paper/406552/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top